Description
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3502-1 | python-git security update |
Debian DLA |
DLA-3939-1 | python-git security update |
Github GHSA |
GHSA-hcpj-qp55-gfph | GitPython vulnerable to Remote Code Execution due to improper user input validation |
Ubuntu USN |
USN-5968-1 | GitPython vulnerability |
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-11-03T21:46:05.215Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-24439
No data.
Status : Modified
Published: 2022-12-06T05:15:11.420
Modified: 2025-11-03T22:15:57.110
Link: CVE-2022-24439
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN